Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IMELO-Secure, Version 1.1
BSI-DSZ-CC-1013-V2-2022
Huawei GaussDB 200 version 6.5.1 build e3690037
2019-32-INF-3664
name IMELO-Secure, Version 1.1 Huawei GaussDB 200 version 6.5.1 build e3690037
category Other Devices and Systems Databases
scheme DE ES
not_valid_after 14.04.2027 22.03.2027
not_valid_before 14.12.2022 22.03.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-INF-3664.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1013V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-32-ST.pdf
manufacturer SSI Schäfer Plastics GmbH Huawei Technologies Co., Ltd.
manufacturer_web https://ssi-plastic.com https://www.huawei.com
security_level ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ EAL2+, ALC_FLR.2
dgst 3da0a90c7bb5a9cd b91f3f25e268a1e0
heuristics/cert_id BSI-DSZ-CC-1013-V2-2022 2019-32-INF-3664
heuristics/cert_lab BSI []
heuristics/cpe_matches {} cpe:2.3:a:huawei:gaussdb_200:6.5.1:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.5:*:*:*:*:*:*:*, cpe:2.3:a:huawei:gaussdb_200:6.5.1.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2020-1811, CVE-2020-1790, CVE-2020-1853
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ALC_DEL.1, ATE_IND.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.1 6.5.1
heuristics/report_references/directly_referencing BSI-DSZ-CC-1013-2017 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1013-2017 {}
heuristics/scheme_data
  • category: Other products
  • cert_id: BSI-DSZ-CC-1013-V2-2022
  • certification_date: 14.12.2022
  • enhanced:
    • applicant: SSI Schäfer Plastics GmbH Kalkofen 6 58638 Iserlohn
    • assurance_level: EAL1,ASE_SPD.1,ASE_REQ.2,ASE_OBJ.2
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2c_pdf.pdf?__blob=publicationFile&v=3
    • certification_date: 14.12.2022
    • description: The TOE is referred to as IMELO-Secure 1.0. It is a waste bin identification system developed by Institut für Entsorgung und Umwelttechnik GmbH. The TOE is evaluated and certified conform to the PP „Protection Profile Waste Bin Identification System (WBIS-PP), Version 1.04“. Waste bin identification systems (WBIS) in the sense of this document are systems, which allow to identify waste bins by an ID-tag (e.g. an electronic chip which is referred to as transponder) in order to determine how often a specific waste bin has been cleared. Note that this type of system does not identify the waste directly but the waste bin, which contains the waste for disposal.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1013-V2-2022', 'description': 'Environment.'}), frozendict({'id': 'BSI-DSZ-CC.1013-2017', 'description': 'Security Target'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 13.12.2027
    • product: IMELO-Secure, Version 1.1
    • protection_profile: Protection Profile Waste Bin Identification Systems (WBIS-PP), Version 1.04, 27 May 2004, BSI-PP-0010-2004
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1013V2b_pdf.pdf?__blob=publicationFile&v=3
  • product: IMELO-Secure, Version 1.1
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/1013_1013V2.html
  • vendor: SSI Schäfer Plastics GmbH
  • category: Database management systems
  • certification_date: 22.03.2022
  • enhanced:
  • manufacturer: Huawei Technologies Co., Ltd.
  • product: Huawei GaussDB 200 version 6.5.1 build e3690037
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/805-huawei-gaussdb-200-version-6-5-1-build-e3690037
heuristics/protection_profiles f1e8c937d15e713a 3f6ac99252bbf14e
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf
pdf_data/cert_filename 1013V2c_pdf.pdf 2019-32_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1013-V2-2022: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
  • BSI:
    • BSI-CC-PP-0088-V2: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ASE:
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • R:
    • R.C: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 2
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem"
  • /Subject: Common Criteria, Certification, Zertifizierung, WBIS, Imelo, Müllbehälter-Identifikationsystem
  • /Title: Zertifikat BSI-DSZ-CC-1013-V2-2022
  • pdf_file_size_bytes: 457534
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220310164952+01'00'
  • /ModDate: D:20220310164952+01'00'
  • /Producer: GPL Ghostscript 9.27
  • pdf_file_size_bytes: 847729
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 1013V2a_pdf.pdf 2019-32-INF-3664.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-1013-V2-2022
    • cert_item: IMELO-Secure, Version 1.1
    • cert_lab: BSI
    • developer: SSI Schäfer Plastics GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1013-: 1
    • BSI-DSZ-CC-1013-2017: 2
    • BSI-DSZ-CC-1013-V2-2022: 11
  • ES:
    • 2019-32-INF-3664- v1: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0010-2004: 1
    • BSI-PP-0010-2004: 2
  • BSI:
    • BSI-CC-PP-0088-V2: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
    • EAL 2: 1
    • EAL 4: 1
    • EAL1+: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 7
    • EAL2+: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DEL.1: 1
    • ALC_FLR: 1
  • ASE:
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 4
    • ASE_SPD.1: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_OPE.1: 1
    • AGD_PRE: 4
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
    • ALC_FLR.2: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SEL.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_TRC.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_TSE.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 5
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 14
    • Huawei Technologies Co: 3
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
  • DEKRA:
    • DEKRA Testing and Certification: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
  • SHA:
    • SHA2:
      • SHA256: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
      • TLSv1.1: 1
      • TLSv1.2: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_metadata
  • /CreationDate: D:20220325091528+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220325091528+01'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 909986
  • pdf_hyperlinks: https://www.sogis.org/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename 1013V2b_pdf.pdf 2019-32-ST.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0010-: 1
    • BSI-PP-0010-2004: 1
  • BSI:
    • BSI-CC-PP-0088-V2: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL1: 1
    • EAL1 augmented: 1
    • EAL1+: 8
  • EAL:
    • EAL 2: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMS: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 2
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_DAU: 6
    • FDP_DAU.1: 6
    • FDP_DAU.1.1: 5
    • FDP_DAU.1.2: 5
    • FDP_ITT: 5
    • FDP_ITT.1: 1
    • FDP_ITT.5: 16
    • FDP_ITT.5.1: 6
    • FDP_SDI: 3
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 5
  • FPT:
    • FPT_FLS.1: 2
  • FRU:
    • FRU_FLT.1: 6
    • FRU_FLT.1.1: 5
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 2
    • FAU_MTD.1: 2
    • FAU_SEL.1: 10
    • FAU_SEL.1.1: 2
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 2
  • FIA:
    • FIA_ATD.1: 16
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID.1: 15
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_USB.1: 5
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 15
    • FMT_REV.1.1: 5
    • FMT_REV.1.2: 3
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
    • FPT_TRC.1: 11
    • FPT_TRC.1.1: 2
    • FPT_TRC.1.2: 2
  • FTA:
    • FTA_MCS.1: 9
    • FTA_MCS.1.1: 2
    • FTA_MCS.1.2: 2
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 2
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.ID: 1
  • R:
    • R.ID: 1
  • A:
    • A.AUTHUSER: 2
    • A.CONNECT: 3
    • A.MANAGE: 3
    • A.NO_GENERA: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.PEER_FUNC: 1
    • A.PHYSICAL: 3
    • A.SUPPORT: 4
    • A.TRAINEDUS: 1
    • A.TRAINEDUSER: 1
  • O:
    • O.ADMIN_RO: 3
    • O.ADMIN_ROL: 1
    • O.ADMIN_ROLE: 7
    • O.AUDIT: 2
    • O.AUDIT_GE: 2
    • O.AUDIT_GENERATION: 3
    • O.DISCRETIO: 3
    • O.DISCRETIONARY: 1
    • O.DISCRETIONARY_ACCESS: 5
    • O.MANAGE: 13
    • O.MEDIATE: 9
    • O.RESIDUAL: 2
    • O.RESIDUAL_: 1
    • O.RESIDUAL_I: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMATION: 6
    • O.TOE_ACCE: 8
    • O.TOE_ACCES: 1
    • O.TOE_ACCESS: 10
  • OE:
    • OE.ADMIN: 10
    • OE.INFO: 5
    • OE.INFO_PRO: 4
    • OE.INFO_PROTECT: 11
    • OE.IT_REMOT: 4
    • OE.IT_REMOTE: 6
    • OE.IT_TRUST: 4
    • OE.IT_TRUSTED: 1
    • OE.IT_TRUSTED_SYSTEM: 5
    • OE.NO_GENE: 3
    • OE.NO_GENERAL: 1
    • OE.NO_GENERAL_PURPOSE: 4
    • OE.PHYSICAL: 8
  • T:
    • T.ACCESS_TSF: 2
    • T.ACCESS_TSFDATA: 2
    • T.ACCESS_TSFFUNC: 1
    • T.IA_MASQUE: 2
    • T.IA_MASQUERADE: 2
    • T.IA_USER: 2
    • T.RESIDUAL_: 1
    • T.RESIDUAL_DATA: 2
    • T.TSF: 1
    • T.TSF_COMPR: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHOR: 2
    • T.UNAUTHORIZED_ACCESS: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Huawei:
    • Huawei: 9
    • Huawei Technologies Co: 87
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 3
pdf_data/st_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-20012-09-001: 1
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 3
    • CCMB-2012-09-003: 3
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1_SLES.tar.gz Clients Clients (including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Server Tools Server Tools: 1
    • Co., Ltd. 6 Item Requirement ● NeoKylin 7.6 Software The Software of Python v2.7.5 is also out of scope and thus not included in the TOE. JDK v1.8 (server version) FusionInsight_BASE_6.5.1_SLES.tar.gz: 1
    • Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the: 1
    • including local and remote clients: gsql 6.5.1, JDBC, ODBC) are also out of scope and thus not included in the TOE: 1
    • is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE. They are used to manager and monitor the TOE. Firewall Used to: 1
    • out of scope: 7
    • provide the required environment for installing and running the TOE. Data Network channel is also out of scope and thus not included in the TOE. It is used to transmit service data between node instances in a: 1
    • this is, all tools listed in section 7.3 of GaussDB 200 6.5.1 Product Documentation 09.pdf) are also out of scope and thus not included in the TOE: 1
    • with new information. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are: 1
pdf_data/st_metadata
  • /Author: Hartmut Möllmann;[email protected];Matthias Spielmann;Ulrich Schurkus
  • /Keywords: CC-Dokumentation
  • /Subject: Sicherheitsvorgaben
  • /Title: Sicherheitsvorgabe für das Behälter Identifikationssystem „IMELO-Secure“ Version 1.0
  • pdf_file_size_bytes: 747264
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different